Hi everyone,
I’m trying to set up a WireGuard tunnel between two Mikrotiks at different sites, but I’m encountering a connectivity issue. I’ve created a diagram to illustrate the current setup:

Problem Description:
From the Laptop at Site A, I can successfully ping the WireGuard IP at Site B: 10.230.10.2.
However:
I cannot ping 192.168.50.250 (Site B) from the Laptop at Site A.
I also cannot ping 192.168.50.250 from the Mikrotik at Site A using:
ping 192.168.50.250 src-address=172.16.0.254
I suspect I’m missing something in the configuration, but I can’t figure out what it is.
What I’ve Tried:
Verified that routes for the 192.168.50.0/24 network are correctly set up.
Checked firewall rules to ensure traffic between the 172.16.0.0/24 and 192.168.50.0/24 networks is allowed.
Confirmed that the WireGuard peers are configured with the correct allowed addresses.
Attached Exports:
Export of Site A configuration:
/interface bridge
add name=Bridge_Lan port-cost-mode=short
/interface ethernet
set [ find default-name=ether1 ] comment=WAN
set [ find default-name=ether2 ] comment=LAN
/interface wireguard
add listen-port=53231 mtu=1300 name=wgPolar
/interface vlan
add interface=ether1 name=vlan_pepehone vlan-id=20
/interface list
add name=WAN
/ip pool
add name=dhcp_pool_BridgeLAN ranges=172.16.0.20-172.16.0.100
/ip dhcp-server
add address-pool=dhcp_pool_BridgeLAN interface=Bridge_Lan name=dhcp1
/interface bridge port
add bridge=Bridge_Lan interface=ether2 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether3 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether4 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether5 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether6 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether7 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether8 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=sfp-sfpplus1 internal-path-cost=10 path-cost=\
10
add bridge=Bridge_Lan interface=sfp-sfpplus2 internal-path-cost=10 path-cost=\
10
add bridge=Bridge_Lan interface=ether9 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether10 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether11 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether12 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether13 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether14 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether15 internal-path-cost=10 path-cost=10
add bridge=Bridge_Lan interface=ether16 internal-path-cost=10 path-cost=10
/ip firewall connection tracking
set udp-timeout=10s
/interface list member
add interface=ether1 list=WAN
add interface=vlan_pepehone list=WAN
/interface wireguard peers
add allowed-address=10.0.10.0/24,10.230.10.2/24,192.168.50.0/24 comment=\
Polar_B interface=wgPolar name=PolarPeer persistent-keepalive=25s \
public-key="xxxxx"
/ip address
add address=172.16.0.254/24 interface=Bridge_Lan network=172.16.0.0
add address=10.230.10.1/24 interface=wgPolar network=10.230.10.0
/ip cloud
set ddns-enabled=yes ddns-update-interval=5m
/ip dhcp-client
add interface=ether1
add interface=vlan_pepehone
/ip dhcp-server network
add address=172.16.0.0/24 dns-server=172.16.0.254 gateway=172.16.0.254
/ip firewall filter
add action=fasttrack-connection chain=forward connection-state=\
established,related hw-offload=yes
add action=accept chain=forward dst-address=192.168.50.0/24 src-address=\
172.16.0.0/24
add action=accept chain=forward dst-address=172.16.0.0/24 in-interface=\
wgPolar
add action=accept chain=forward dst-address=172.16.0.0/24 out-interface=\
wgPolar
add action=accept chain=forward dst-address=172.16.0.0/24 out-interface=\
Bridge_Lan
add action=accept chain=forward dst-address=172.16.0.2
add action=accept chain=forward dst-address=172.16.0.250
add action=accept chain=forward dst-address=172.16.0.4
add action=accept chain=input comment="Regles Basiques protecci\F3 INPUT" \
connection-state=established,related
add action=drop chain=input connection-state=invalid
add action=accept chain=forward comment="Regles Basiques protecci\F3 FORWARD" \
connection-state=established,related
add action=drop chain=forward connection-state=invalid
add action=accept chain=output comment="Regles Basiques protecci\F3 OUTPUT" \
connection-state=established,related
add action=drop chain=output connection-state=invalid
/ip firewall nat
add action=accept chain=srcnat dst-address=192.168.50.0/24 log=yes \
src-address=172.16.0.0/24
add action=accept chain=srcnat dst-address=10.0.10.0/24 log=yes src-address=\
172.16.0.0/24
add action=masquerade chain=srcnat comment="NAT LAN Interna"
/ip firewall raw
add action=notrack chain=prerouting disabled=yes dst-address=172.16.0.0/24 \
src-address=10.1.0.0/24
add action=notrack chain=prerouting disabled=yes dst-address=10.1.0.0/24 \
src-address=172.16.0.0/24
add action=accept chain=prerouting disabled=yes in-interface=vlan_pepehone \
src-address=10.10.0.0/24
/ip route
add disabled=no distance=1 dst-address=192.168.50.0/24 gateway=wgPolar \
routing-table=main scope=10 suppress-hw-offload=no target-scope=5
add disabled=no distance=1 dst-address=10.0.10.0/24 gateway=wgPolar \
routing-table=main scope=10 suppress-hw-offload=no target-scope=5
Export of Site B configuration:
/interface ethernet
set [ find default-name=ether1 ] mtu=1400
set [ find default-name=ether2 ] disable-running-check=no mtu=1400
/interface wireguard
add listen-port=53231 mtu=1300 name=wgPolar_B
add disabled=yes listen-port=13231 mtu=1300 name=wireguard1
/port
set 0 name=serial0
/interface wireguard peers
add allowed-address=172.16.0.0/24,10.230.10.1/32,192.168.50.0/24 endpoint-address=213.195.101.31 endpoint-port=53231 interface=wgPolar_B name=PolarPeer persistent-keepalive=25s \
public-key="xxxxxxx="
/ip address
add address=10.0.10.253/24 interface=ether2 network=10.0.10.0
add address=10.230.10.2/24 interface=wgPolar_B network=10.230.10.0
/ip dhcp-client
add interface=ether1
add disabled=yes interface=ether2
add disabled=yes interface=ether2
/ip firewall filter
add action=fasttrack-connection chain=forward connection-state=established,related hw-offload=yes
add action=accept chain=forward connection-state=established,related
add action=accept chain=forward dst-address=192.168.50.0/24 src-address=172.16.0.0/24
add action=accept chain=forward dst-address=172.16.0.0/24 src-address=192.168.50.0/24
add action=accept chain=forward comment="Regles Basiques protecci\F3 FORWARD" connection-state=established,related
add action=drop chain=forward connection-state=invalid
add action=accept chain=input comment="Regles Basiques protecci\F3 INPUT" connection-state=established,related
add action=drop chain=input connection-state=invalid
add action=accept chain=output comment="Regles Basiques protecci\F3 OUTPUT" connection-state=established,related
add action=drop chain=output connection-state=invalid
/ip firewall nat
add action=accept chain=srcnat dst-address=192.168.50.0/24 src-address=172.16.0.0/24
add action=accept chain=srcnat dst-address=172.16.0.0/24 src-address=192.168.50.0/24
add action=masquerade chain=srcnat comment="NAT LAN Interna"
/ip route
add disabled=no dst-address=172.16.0.0/24 gateway=wgPolar_B routing-table=main suppress-hw-offload=no
Does anyone have an idea of what might be missing? Any help would be greatly appreciated!